Hacking, a leading crime.
7:12 AM
TERM PAPER
PAPER
TITLE: Hacking, a leading crime.
DEERWALK
INSTITUE OF TECHNOLOGY
SCHOOL
OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
SIFAL,
KATHMANDU, NEPAL.
NAME: Suman Thapa
ROLL NUMBER:0215
CLASS: 0216 ‘A’
SUBMITTED DATE: 9/24/2013
Contents
Methodology…….………………………………………………………………………..………………..1
History
of hacking…………………………………………………………………………………………..2
Abstract
Nowadays Hacking has been one of the common practices
made by the computer expert in order to try
and find vulnerabilities in a network infrastructure.
In this paper I have mentioned three different types
of Hacker
i.e. White Hat Hacker, Grey Hat Hacker and Black Hat hacker. White Hat Hacking is the practice made
by the hackers to dominant the world by their criminal skills. It is used in
the profit making purpose. Whereas Grey Hat Hacker is a Hacker who is
part White Hat and part Black Hat. They can be both helpful and harmful purpose. Grey Hat Hackers can also
be known as ethical hackers. Similarly
last and most demanding types of hacker known as Black Hat Hacker is described
in this paper. It is also known as cracker or dark side hacker. Further, we
talk about Daily trends
of hacking attacks including Distribution of Attack Techniques and Distribution of Targets. We also
found which country has high risk of hacking. In this way I also have found the
preventive measures for being safe from hackers.
Introduction
The
word ‘hack’ refers to use a computer to gain unauthorized
access to data in a system. When someone modifies computer
hardware or software in a way that alters the creator's original intent, it is
known as computer hacking and People who hack computers are called hackers. Nowadays
Hacking has been one of the common practices made by the computer expert in
order to try and find vulnerabilities in a network infrastructure. There are different types of hacking White Hat Hacking, Grey Hat Hacking and Black
Hat hacking. White Hat Hacking is the practice made by the hackers to dominant
the world by their criminal skills. It is used in the profit making purpose.
Similarly other type of hacking is Grey Hat Hacking in which he or she is
submerged in the world of hacking for non-profitable purpose Grey Hat Hackers
can also be known as ethical hackers. Similarly last and most high demanding
types of hacking known as Black Hat Hacking is describe in this paper. It is
also known as cracker or dark side hacker. In this types of hacking he or she
is fully involve in profit making activities by destroying organization
network, stealing others valuable data ,documents, hacking bank account and
transferring money to their own and so
on.
Methodology
This research is based on internet. It is a totally
web based research. Different types of hacking with their motivates are found
using internet. Also the daily trend of attack is studied in this paper. The
top 3 countries leading in high hacking is found on the basis of previous researches.
Since, only few data were existed on the basis of
objective of research so it took lot of time in searching. I went through
almost all the search engines. Time taken for finding results differed in each
search engines. However, I managed to do the best in my own view.
There are three
types of hackers and they are white hat, grey hat, and black hat.
White hat hackers :
White Hat Hacking is the practice made by the hackers to dominant the world by
their criminal skills. It is used in the profit making purpose.
A Grey hat hacker is a Hacker who is part White Hat and part Black Hat. They
can be both helpful and harmful, and should be treated with respect.
A Black hat hacker.
In this types of hacking he or she is fully involve in profit making activities
by destroying organization network, stealing others valuable data ,documents,
hacking bank account and transferring
money to their own and so on.
History of hacking
Nowadays many people have different views on the hacking
scenes. The origin of the term "hacker began in the 1960s at MIT (Massachusetts Institute of Technology) similarly during
1960s hackers emerged out of the artificial intelligence labs at MIT.
In1969, Bell Labs employee Ken Thompson invented UNIX. Then in 1970s, Dennis Ritchie invented "C” programming language which was specifically invented to be used with UNIX. ARPANET (Advanced Research Projects Agency Network) was founded by the Department of Defense as a means to link government offices later on it was evolved into internet.
In1969, Bell Labs employee Ken Thompson invented UNIX. Then in 1970s, Dennis Ritchie invented "C” programming language which was specifically invented to be used with UNIX. ARPANET (Advanced Research Projects Agency Network) was founded by the Department of Defense as a means to link government offices later on it was evolved into internet.
Charts
Here the summer
shows its effects showing a constantly decreasing shape after the peak occurred
the 15th
Sorry 4 the technical error
Below is the chart
of Distribution of Attack Techniques and it is found that Defacements lead the Chart. Also the account Hijackings are
becoming very popular. Whereas SQLi and DDoS are out from the first three ranks.
Defacements are taken into consideration only when they are meaningful, that is
targeting Governmental primary domains or high profile targets, or also when
they cause the leaking of data.
Sorry 4 the technical error
The Distribution
of Targets Chart
below confirms governmental targets at the first place with nearly 30%,
immediately followed by, as usual, industries (18.8%) & organizations
(12.5%). In any case the level of attention of crooks is also high against
targets belonging to the Financial and News sector, which steadily rank
respectively at number 4 & 5 of this unwelcome chart with the 10.9% and
9.4%.
Hacking attacks in US , India and
China
Here are the 3 countries with respective data showing their hacking
statistics
1. United States
The United States topped in overall
malicious activity measured by Symantec, with 19 percent of the total in 2009.
This is a drop from 23 per cent in 2008. The United States was the country of
the most bot-infected computers observed by Symantec in 2009, accounting for 11
per cent of the global total, a slight decrease from 12 percent in 2008. It
also topped as the No.1 country of origin for Web-based attacks in 2009,
accounting for 34 per cent of the worldwide total.
2. China
China is ranked second in the list
in terms of bots and origin of most attacks. It is ranked sixth in terms of
phishing hosts and eighth in terms of spam zombies. China was at the same
position last year also.
3. India
India is the world's third largest hotspot
of malicious activity, according to Symantec's Internet Security Threat report.
The top Web-based attack in 2009 was associated with malicious PDF activity,
which accounted for 49 percent of the total attacks. The education sector
accounted for 20 percent of data breaches that could lead to identity theft
during this period, more than any other sector; this is a decrease from 27
percent in 2008, when it was also the highest ranked sector for data breaches.
Symantec observed an average of 46,541 active bot-infected computers per day in
2009; this is a 38 percent decrease from the 75,158 per day average observed in
2008. The report pointed out that 'bot' or 'robot software' is being highly
preferred in cyber-attacks.
We can take following steps for prevention of hacking:
·
Harden our system by
deactivating unnecessary software.
·
Installing Firewall on
the system.
·
Not using same password
for multiple account.
·
Using encrypted
connection.
Hence, from this research, it can
be concluded that hacking is increasing day by day. US are leading in having
hacking attacks whereas China and India are on second and third position. We
know these countries are also leading in development in many fields. If such
countries are not safe from hacking then no one else is safe which ultimately
means we may be hacked at any time anywhere. So, we can call hacking as a
leading crime.
This post is so interactive and informative.keep updating more information...
ReplyDeletePHP Programing
PHP Training